shoyo / acoustic-keyloggerLinks
Pipeline of a keylogging attack using just an audio signal and unsupervised learning.
☆154Updated 2 years ago
Alternatives and similar repositories for acoustic-keylogger
Users that are interested in acoustic-keylogger are comparing it to the libraries listed below
Sorting:
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆304Updated 6 months ago
- A tool for processing a lot of pcaps using tshark☆153Updated 2 years ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆607Updated 3 months ago
- Let's brute force this hotel's tv.☆82Updated 5 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆114Updated last year
- ☆521Updated 9 months ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- Hash identification program.☆154Updated 3 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆72Updated 2 years ago
- A rainbow table implementation for non-uniform inputs, such as phone numbers.☆26Updated 3 years ago
- Nmap for Bluetooth Low Energy☆202Updated last year
- "Unoriginal-Rice-Patty" is my personal title for the Replay-based attack on Honda and Acura vehicles☆347Updated last year
- Audio file steganography. Hides files or text inside audio files and retrieve them automatically☆292Updated 2 years ago
- ☆131Updated 6 years ago
- Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]☆185Updated 3 years ago
- A5/1 Decryption☆123Updated 6 years ago
- Recovers pixelized text from images☆218Updated 3 years ago
- List of the tools and usage☆234Updated 4 months ago
- Browser-based network scanner & local-IP detection☆462Updated 4 years ago
- Apple geolocation services reverse engineering. Database scraper.☆64Updated 2 years ago
- A ZigBee hacking toolkit by Bishop Fox☆288Updated 4 years ago
- Scripts and more for the Wyze camera☆87Updated 5 years ago
- its like a tricorder, for your wireless world.☆114Updated last year
- GIF displaying its own MD5 (hashquine)☆78Updated 5 years ago
- Minimalist Asterisk Caller ID Spoofer and Secondary VOIP Line Configuration Built for AWS☆303Updated 5 years ago
- Freedom Shield was developed to protect the rights of individuals to peaceably assemble and petition their government.☆81Updated 5 years ago
- its like a tricorder, for your wireless world.☆94Updated last year
- Toolkit for Playing with Wi-Fi Probe Requests☆270Updated 3 weeks ago
- Inaudible Voice Commands☆110Updated 3 years ago
- Poor mans Bash Bunny☆86Updated 7 years ago